Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems... [more]
Offers readers of all backgrounds and experience levels a well-researched and engaging introduction to the realm of network... [more]
Bitcoin is the first application to emerge from the underlying blockchain technology, and others that follow might have more... [more]
This comprehensive guide to modern data encryption makes cryptography accessible to information security professionals of... [more]
This book constitutes the proceedings of the 10th International Workshop on Security, IWSEC 2015, held in Nara, Japan, in... [more]
The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International Cryptology... [more]
In Mathematical Foundations of Public Key Cryptography, the authors integrate the results of more than 20 years of research... [more]
A comprehensive evaluation of information security analysis spanning the intersection of cryptanalysis and side-channel analysis... [more]
Advances in computer technology have led to an increased need for online security and the protection of personal information.... [more]
This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications,... [more]
This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and... [more]
The book explores the intersection of cloud-computing, cyber-security, and critical infrastructure protection and simulation... [more]
<p>From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive... [more]
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial... [more]
There has been roughly 15 years of research into approaches for aligning research in Human Computer Interaction with computer... [more]
This book constitutes the refereed proceedings of the 4th International Conference on Security, Privacy, and Applied Cryptography... [more]
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security... [more]
Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make... [more]
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Workshop on Fast Software... [more]
An Introduction to Mathematical Cryptography [more]
Cloud computing is one of these new areas, where cryptography is expected to unveil its power by bringing striking new features... [more]
* Makes deep mathematical problems accessible to computerscientists and engineers * Based on classroom tested materials... [more]
Because requirements engineers, safety engineers, and security engineers do not know how to collaborate to produce proper... [more]
Focuses on the basic mathematical tools needed for cryptographic design: computational difficulty (one-way functions), pseudorandomness... [more]
Focuses on security aspects of public key infrastructures, addressing such issues as inadequacy of security checks when certificates... [more]